Apply Deception Techniques to Detect Security Threats
Should your organization utilize threat deception
The tools and techniques available for threat deception
Emerging operational practices around deception
Watching on-demand? Tell us what you think. You can still submit feedback under the "Rate this" tab.
As organizations struggle to deal with the evolving security threat landscape, there has been a resurgence in interest on deception techniques. Simple honeypots have evolved into distributed deception platforms and existing security solutions have also started to include deception components. This webinar focuses on using deception as a "low-friction" method to detect lateral threat movement and as an alternative or a complement to other detection technologies.